A Heuristic Method of Attack Graph Analysis for Network Security Hardening